[84771] in North American Network Operators' Group
HTTP Proxies used for Fighting Spyware: Feedback
daemon@ATHENA.MIT.EDU (Two Bit)
Fri Sep 23 15:19:17 2005
Date: Fri, 23 Sep 2005 15:17:54 -0400
From: Two Bit <two.bit7@gmail.com>
Reply-To: Two Bit <two.bit7@gmail.com>
To: nanog@merit.edu
Errors-To: owner-nanog@merit.edu
------=_Part_14117_25738835.1127503074231
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Hi there, long-time Nanog lurker network engineer with a (maybe off-topic)
question related to network architecture solutions to fight the
spyware/greyware problem. I was wondering if anyone might have any
experience deploying anti-spyware solutions which reside on HTTP Proxies.
Several products claim to be able to detect spyware on the wire such as ISS=
,
SonicWall, Fortinet, Astaro, BlueCoat. However, I am concerned about the
performance, especially since they have to use an AntiVirus product on the
back-end (heavy processing). Curious what the user experience might be, how
effective any of these solutions are in really catching spyware, and any
other operational experiences from engineers employing any of these
solutions out in the field (not from vendors, please) that may help narrow
down the choices. Thanks for any input.
------=_Part_14117_25738835.1127503074231
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Hi there, long-time Nanog lurker network engineer with a (maybe
off-topic) question related to network architecture solutions to fight
the spyware/greyware problem. I was wondering if anyone might
have any experience deploying anti-spyware solutions which reside on
HTTP Proxies. Several products claim to be able to detect
spyware on the wire such as ISS, SonicWall, Fortinet, Astaro,
BlueCoat. However, I am concerned about the performance,
especially since they have to use an AntiVirus product on the back-end
(heavy processing). Curious what the user experience might be,
how effective any of these solutions are in really catching spyware,
and any other operational experiences from engineers employing any of
these solutions out in the field (not from vendors, please) that may
help narrow down the choices. Thanks for any
input. <br>
<br>
<br>
<br>
------=_Part_14117_25738835.1127503074231--